نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thorough and timely auditing is often diicult to attain. Recent literature suggests that expert systems techniques can ooer signiicant beneets when applied to security procedures such as risk analysis , security auditing and intru...
Computer security auditing constitutes an important part of any organization’s security procedures. Because of the many inadequacies of currently used manual methods, thorough and timely auditing is often difficult to attain. Recent literature suggests that expert systems techniques can offer significant benefits when applied to security procedures such as risk analysis, security auditing and i...
Introduction: Identifying the factors leading to job satisfaction could be useful in increasing faculty members' job satisfaction and motivating them to perform their educational and research activities. This study was conducted to determine job satisfaction rate among faculty members of Isfahan University of Medical Sciences in the year 2005-2006. Methods: In a descriptive study, 210 faculty ...
Introduction: Every health organization life depends on its correct coding system. One of the best tools in collecting correct and valid data is to make a clinical coding and procedures. Clinical Coding policy and procedures, in face of personals changes causes stability, and continues the clinical coding and provide a frame for decision making and doing duties . Methods: This research was carr...
This study compares changes in attitudes of students towards organizational security policies and procedures at various institutions that have implemented information security policy training as part of the orientation and ongoing training for students. The results indicate that those institutions that provide multiple venues to discuss security policies and procedures during the student career...
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the last line – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow secu...
It is shown that the application of multi-step quality games theory allows financing various information technologies considering factors. In particular, there are lots approaches to building effective security systems in enterprise. Using such model will make it possible develop, based on game models, decision support (DSS), for example, software products (PP). Which, turn, allow making ration...
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures. While these external guidelines make recommendations as to how an organisation should develop and implement best practices in computer security they often fail to provide a mechanism that links th...
The volume and severity of information security breaches encountered continues to increase as organizations, including healthcare organizations, struggle to identify more effective security policies and procedures. Publicly available guidelines such as GASSP or ISO17799 that are designed to facilitate development of effective security policies and procedures have been criticized for, among othe...
Technology assessment and selection has a substantial impact on organizations procedures in regards to technology transfer. Technological decisions are usually made by a group of experts, and whereby integrity of these viewpoints to a single decision can be quite complex. Today, operational databases and data warehouses exist to manage and organize data with specific features and henceforth, th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید